pisco_log
banner

Research on Security Protection Strategies for Big Data Platforms under Cloud Computing Architecture

Youjiang Zhou

Abstract


The widespread adoption of cloud computing architectures brings advantages to big data platforms, such as high-concurrency
processing, elastic scalability, and resource sharing. However, it also presents security risks characterized by cross-domain, dynamic, and
systematic traits. Based on the security challenges in cloud computing environments, this study analyzes the core risks arising from multitenant isolation, enhanced data mobility, and elastic resource scheduling, and constructs a cloud security protection framework encompassing zero-trust access control, cloud-edge-terminal encryption systems, automated configuration management, and continuous monitoring.
On this basis, three optimization paths are proposed: intelligent threat detection, visual compliance governance, and joint protection mechanisms between cloud service providers and enterprises, aiming to enhance the platform's proactive defense capabilities and collaborative
governance effectiveness. The study seeks to provide scalable technical ideas and practical references for building security systems in
cloud-based big data platforms.

Keywords


Cloud Computing; Big Data Platform; Security Protection; Zero Trust; Intelligent Detection

Full Text:

PDF

Included Database


References


[1] Li Jingwen, Luo Peng. Research on Security and Privacy Protection of Cloud-Native Communication Big Data Platform [J]. Digital

Communication World, 2024, (02):167-169.

[2] Zhang Shuai, Yu Zhongchen, Liu Yong, et al. Research on Data Circulation Security Model of Digital Twin City Big Data Platform [J].

Information Security Research, 2023, 9(01):48-56.

[3] Liu Zhiyong, He Zhongjiang, Ruan Yilong, et al. Big Data Security Features and Operational Practices [J]. Telecommunications Science, 2021, 37(05):160-169.




DOI: http://dx.doi.org/10.70711/frim.v4i3.8750

Refbacks

  • There are currently no refbacks.